Network intrusion detection systems (NIDSs) critically rely on processing a great deal of state. Often much of this state resides solely in the volatile processor memory accessibl...
Abstract. Fingerprints are one of the most used biometrics for automatic personal authentication. Unfortunately, it is often difficult to design fingerprint matchers exhibiting th...
Abstract. Grid computing is a form of distributed computing that involves coordinating and sharing computing, application, data storage or network resources across dynamic and geog...
Abstract. Due to the complexity and uncertainties, the engineering process requires dynamic collaborations among the heterogeneous systems and human interactions. In this paper, we...
Jian Cao, Jie Wang, Shen-sheng Zhang, Minglu Li, K...
We have recently introduced a hyper-heuristic genetic algorithm (hyper-GA) with an adaptive length chromosome which aims to evolve an ordering of low-level heuristics so as to find...